Description
A missing permission check in Jenkins GitLab Plugin 1.5.11 and earlier in the GitLabConnectionConfig#doTestConnection form validation method allowed attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Remediation
References
https://jenkins.io/security/advisory/2019-04-17/#SECURITY-1357
http://www.securityfocus.com/bid/108045
Related Vulnerabilities
CVE-2022-4772 Vulnerability in maven package com.github.dgarijo:widoco
CVE-2023-24426 Vulnerability in maven package org.jenkins-ci.plugins:azure-ad
CVE-2019-8331 Vulnerability in maven package org.webjars:bootstrap
CVE-2021-33036 Vulnerability in maven package org.apache.hadoop:hadoop-yarn-server-common